Webinars

Get a Webinar Subscription

Webinars provide convenient online training opportunities and an easy way to earn CPEs from your desktop or mobile device. Gain access to more than 75 live and on-demand webinars, anytime, anywhere with this annual, one-year subscription. Subscribe now for access to all live and on-demand webinars through December 31, 2018—as well as 24 months of archives—for one low fee.

While active shooters are rare, they are more likely to occur than an airplane crash. Yet, flight attendants are trained to handle an evacuation, while most unarmed security staffs are not prepared to respond to an active shooter threat. In this webinar, the presenter will review concepts embraced by Fortune 500 companies, educational systems, and government agencies that can provide security managers with training guidelines to enhance their officers' awareness of and ability to prevent and mitigate active shooter attacks.​

Participants will be able to:

Use techniques to train staff by integrating customer service and security awareness.

The ABCs of Future-Focused Risk Metrics and Measurements

In an environment where physical and cyber risks are increasing, it is critical that security organizations maintain well-established security metrics to better control, track, and refine preparation, mitigation, and response operations to replace fear and uncertainty in organizational functions. While executives are concerned with the security of their organizations, the likelihood of a breach, and effective security programs, metrics should be shaped to provide visibility into operational effectiveness and illustrate the strategic value of those operations. Using examples from security metric programs developed for federal and private security-focused organizations, this presentation will share contemporary best practices for security metrics and measures for security organizations.

Participants will be able to:

Overcome the challenges with designing security measures and metrics that are relevant to the current and future hyper-connected security landscape and ecosystem

Present security measures and metrics that provide business value to the leadership echelon based on the maturity and culture of the organization

Use and present different types of security metrics (lagging and leading strategic, operational, and tactical) to effectively convey the intended message for the audience

Drones and Security

To educate and cut through the hype of unmanned aerial vehicles (UAS)/Drones in the security industry, a panel of specialists will review multiple “use cases” for drone use and defense by a security enterprise. Consider the perspectives of an Federal Aviation Authority (FAA) licensed drone operator, a drone industry subject matter expert, and a physical security design engineer as they share their perspectives and experience. Follow their views of the practical implementation and impact of drones within a business environment. Explore a range of UAS and drone security applications, from basic through advanced, and even future applications.

Participants will be able to:

Explain the fundamentals and implications of unmanned aerial vehicles (UAS) and drone laws, technologies, and applications

Communicate how various UAS and drone countermeasures work, and how their use can be practical and legal

Describe the various ways UAS and drones have been used by security teams

The Unaddressed Mass Casualty Event

This webinar identifies the ability of terrorist organizations to conduct a chemical or biological attack in populated areas. It will cover the mechanism of action, accessibility, delivery, and potential results of a chemical or biological agent. Current laws and regulations are not sufficient to prevent terrorists from producing a large-scale chemical or biological attack. The presenters will use case studies and empirical data to show the simplicity of creating a delivery system that can produce a mass casualty event and address planning considerations for preventing such an attack.

The participants will be able to:

Describe the simplicity of executing a mass casualty event

Communicate the effect of such an attack, including the effects on the Emergency Medical System

Insider Threat #2: Harnessing Culture and Technology for Prevention

The second of a three-part series, this webinar from the ASIS Crime Prevention Council seeks to help participants learn best practice methodologies and how to apply them to their security culture. Webinar series presenters include council members with unique expertise in crime prevention as well guest speakers from government agencies involved in intelligence and counterintelligence.

This webinar will present authentic case scenarios that illustrate the concepts underlying insider threat management and implementation best practices. Participants will learn why and how insider threat policies must be updated to create a new crime prevention culture in their organizations. The importance of balancing transparency with privacy concerns and how to accomplish this cultural shift will be discussed. Finally, the role technology plays in an insider threat prevention strategy and how to manage information (political, economic, cultural, social) is reviewed through potential threat scenarios.

This webinar lays the foundation for the related webinar scheduled for October 24 and we encourage participants to register for both.

Participants will be able to:

Describe insider threat management and implementation best practices.

Achieve the cultural shifts necessary organization-wide to support a successful insider threat program.

Within the government facilities sector, there has been an increase in the number “smart” facilities – via construction, modernization, and legislation – that are intended to enhance energy management, create operational efficiencies, and enable remote accessibility for operators and managers. The internet-connected camera systems, access control systems, elevators, etc. at high-risk facilities have opened an alternate access point for hostile actors to carry out an attack. DHS’ Federal Protective Service (FPS) has incorporated a tiered approach to assessing the cyber and physical security risks to its facilities. In this session, FPS will provide an overview of the types of questions, analysis, and findings it has incorporated and generated from its cyber-physical security assessment methodology.

Participants will be able to:

Distinguish the types of threats and vulnerabilities inherent in facility systems, such as cameras, elevators, access controls, etc. and discuss best practices among the security community

Recognize the Federal Protective Service’s assessment methodology used to evaluate the cyber-physical security risks to its facilities

Explain the cyber risks to facilities and recommendations on how to approach mitigation of those risks as presented by the Federal Protective Service

Managing Enterprise Security in a Compliance Driven Environment

Many of today's Security Managers are tasked with securing the Enterprise while providing support to regulatory requirements. Security is often constrained by budget and/or political considerations. These restrictions can degrade the security department(s) ability to properly design and implement secure infrastructure throughout their organization. This program will provide an insight into physical security counter-measures that can actually place the enterprise at greater risk due to their vulnerability to cyber-attacks or hacking (interactive session), managing an effective enterprise physical key program in a compliance driven environment, and a case study on how Human Factors impact Enterprise security implementation.

Program Objectives

Understand how Physical Security Counter-Measures may place the Enterprise at-risk.

Understand how physical security counter-measures selection can increase the risk to an enterprise due to cyber-attacks, hacking or other cyber vulnerabilities.

Identify what is meant by The Keys to the Kingdom.

Participants will have an understanding of the basic principles and concepts for an effective physical key management program.

Participants will have an understanding of the basic principles and concepts for an effective physical key management program.